Qubes-vpn-support contains an automatic firewall script that will make a dedicated VPN VM fail closed, and also prevent DNS queries and other info from leaking--whether your VPN client of choice is working or has gone down. Attempts to go around a failed VPN tunnel by Tor, for instance, shouldn't work.

Check it out here:
https://github.com/ttasket/Qubes-vpn-support

An openvpn handler script is also included to make DNS work when the VPN tunnel comes up.

Neither the firewall nor the handler require editing before normal use, and they'll work whether you use IP addresses or regular domain names for your VPN connection. This helps eliminate some very error-prone steps from the setup process.

This firewall basically implements the "_full solution_" described by Patrick[1]. Testing is still underway to make sure there are no leaks under varying circumstances, though its looking very promising so far. If any of you would like to try out the VPN Support scripts and put them to the test, I'd love to get your feedback either here or on github.

Regards,
Chris/tasket

1. https://groups.google.com/d/msgid/qubes-devel/5733D91C.6030300%40riseup.net

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/57516C4B.4070305%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to